David Evans
Cited by
Cited by
Localization for Mobile Sensor Networks
L Hu, D Evans
10th Annual International Conference on Mobile Computing and Networking …, 2004
Using Directional Antennas to Prevent Wormhole Attacks
L Hu, D Evans
Network and Distributed System Security Symposium (NDSS), 2004
Improving Security using Extensible Lightweight Static Analysis
D Evans, D Larochelle
IEEE Software 19 (1), 42-51, 2002
Faster Secure Two-Party Computation Using Garbled Circuits
Y Huang, D Evans, J Katz, L Malka
20th USENIX Security Symposium, 2011
Feature Squeezing: Detecting Adversarial Examples in Deep Neural Networks
W Xu, D Evans, Y Qi
Network and Distributed Security Symposium 2018, 2018
Secure Aggregation for Wireless Networks
L Hu, D Evans
Workshop on Security and Assurance in Ad hoc Networks, 2003
Statically Detecting Likely Buffer Overflow Vulnerabilities
D Larochelle, D Evans
Proceedings of the 10th USENIX Security Symposium, 2001
Automatically Hardening Web Applications using Precise Tainting
A Nguyen-Tuong, S Guarnieri, D Greene, J Shirley, D Evans
IFIP TC11 20th International Conference on Information Security, 2005
Perracotta: Mining Temporal API Rules from Imperfect Traces
J Yang, D Evans, D Bhardwaj, T Bhat, M Das
28th International Conference on Software Engineering (ICSE), 2006
LCLint: A Tool for Using Specifications to Check Code
D Evans, J Guttag, J Horning, YM Tan
ACM SIGSOFT Symposium on the Foundations of Software Engineering 19 (5), 1994
N-Variant Systems: A Secretless Framework for Security through Diversity
B Cox, D Evans, A Filipi, J Rowanhill, W Hu, J Davidson, J Knight, ...
15th USENIX Security Symposium, 2006
EnviroTrack: Towards an Environmental Computing Paradigm for Distributed Sensor Networks
T Abdelzaher, B Blum, Q Cao, Y Chen, D Evans, J George, S George, ...
24th International Conference on Distributed Computing Systems (ICDCS), 2004
Static Detection of Dynamic Memory Errors
D Evans
ACM SIGPLAN Conference on Programming Language Design and Implementation …, 1996
Flexible Policy-Directed Code Safety
D Evans, A Twyman
IEEE Symposium on Security and Privacy (Oakland), 1999
Reverse-Engineering a Cryptographic RFID Tag
K Nohl, D Evans, Starbug, H Plötz
17th USENIX Security Symposium, 2008
Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits using Half Gates
S Zahur, M Rosulek, D Evans
Advances in Cryptology-EUROCRYPT 2015, 2015
Privacy Protection for Social Networking Platforms
A Felt, D Evans
Workshop on Web 2.0 Security and Privacy (W2SP), Oakland, CA, 2008
Automatically Evading Classifiers
W Xu, Y Qi, D Evans
Network and Distributed Systems Symposium, 2016
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols?
Y Huang, D Evans, J Katz
Network and Distributed Security Symposium (NDSS 2012), 2012
Security Issues and Requirements for Internet-scale Publish-Subscribe Systems
C Wang, A Carzaniga, D Evans, AL Wolf
35th Annual Hawaii International Conference on System Sciences (HICSS), 2002
The system can't perform the operation now. Try again later.
Articles 1–20